Internet Infrastructure Review Vol.27
Total Page:16
File Type:pdf, Size:1020Kb
Internet Infrastructure Vol.27 Review May 2015 Infrastructure Security Increasingly Malicious PUAs Messaging Technology Anti-Spam Measure Technology and DMARC Trends Web Traffic Report Report on Access Log Analysis Results for Streaming Delivery of the 2014 Summer Koshien Inte r ne t In f r ast r uc t ure Review Vol.27 May 2015 Executive Summary ———————————————————3 1. Infrastructure Security ———————————————4 Table of Contents Table 1.1 Introduction —————————————————————— 4 1.2 Incident Summary ——————————————————— 4 1.3 Incident Survey ——————————————————— 11 1.3.1 DDoS Attacks —————————————————————— 11 1.3.2 Malware Activities ———————————————————— 13 1.3.3 SQL Injection Attacks —————————————————— 16 1.3.4 Website Alterations ——————————————————— 17 1.4 Focused Research —————————————————— 18 1.4.1 Increasingly Malicious PUAs —————————————— 18 1.4.2 ID Management Technology: From a Convenience and Security Perspective ————— 22 1.4.3 Evaluating the IOCs of Malware That Reprograms HDD Firmware —————————————————————— 25 1.5 Conclusion —————————————————————— 27 2. Messaging Technology —————————————— 28 2.1 Introduction ————————————————————— 28 2.2 Spam Trends ————————————————————— 28 2.2.1 Spam Ratios Decline Further in FY2014 ————————— 28 2.2.2 Higher Risks Despite Lower Volumes —————————— 29 2.3 Trends in Email Technologies ——————————— 29 2.3.1 The DMARC RFC ————————————————————— 29 2.3.2 Problems with DMARC and Reporting —————————— 30 2.3.3 Use of DMARC by Email Recipients ——————————— 30 2.3.4 Domain Reputation ——————————————————— 31 2.3.5 Email Ecosystems ———————————————————— 32 2.4 Conclusion —————————————————————— 33 3. Web Traffic Report ————————————————— 34 3.1 Overview of Streaming Delivery of the 2014 Summer Koshien ——————————— 34 3.2 Changes in Access Numbers by Day and Hour — 36 3.3 Differences in Viewing Activities by Device ——— 37 3.3.1 Differences in Viewing Time ——————————————— 37 3.3.2 Differences in Viewing Length —————————————— 37 3.4 Comparison of Client Numbers and Access Numbers by Device ———————————— 38 3.5 Conclusion —————————————————————— 39 n To download current and past issues of the Internet Infrastructure Review in PDF format, please visit the IIJ website at http://www.iij.ad.jp/en/company/development/iir/. 2 Executive Summary According to a report titled “Aggregation and Provisional Calculation of Internet Traffic in Japan,” which was published by the Ministry of Internal Affairs and Communications on April 3, 2015, as of November 2014 the overall download traffic of broadband subscribers was estimated to be 3.6 Tbps. This is a 37.5% increase compared to the same month the previous year. The number of broadband subscribers Executive Summary remained almost flat during this period, showing only a slight increase, which means the shift towards users consuming larger-scale content is progressing. Also, while the volume of mobile user download traffic was still comparatively small at 758 Gbps, it increased by 45.5%, which is higher than the overall increase rate. In the future it is likely that the growth of mobile traffic will be a driving factor in the growth of overall traffic volumes. Meanwhile, major U.S. video streaming service Netflix has announced that it will launch a service in Japan this fall. It is thought that companies including Hulu and domestic operators such as acTVila and Hikari TV that have already entered the Japanese market will invest in their services to vie for customers, so the Internet-based online video streaming market is expected to see a major boost towards the latter half of this year. In the coming months there is likely to be a major upheaval in the state of Internet usage from a traffic perspective. This report discusses the results of the various ongoing surveys and analysis activities that IIJ, as a service provider, carries out to support the Internet and cloud infrastructure, and enable our customers to continue to use them safely and securely. We also regularly present summaries of technological development as well as important technical information. In the “Infrastructure Security” section, we give a month-by-month chronological summary of major incidents observed during the three months from January 1 to March 31, 2015, and report on the results of our statistics gathering and analyses for the entire period. We also present our focused research for this period, including a look at analysis results for PUA (Potentially Unwanted Programs) as well as discussion of the techniques used. In addition, we examine malware that reprograms HDD firmware, and continue our report on ID management technology from the previous volume. In the “Messaging Technology” section, we report on our analysis of spam trends for the 52 weeks between March 31, 2014, and March 29, 2015, while also looking at long-term trends from IIR Vol.1 (June 2008). In our discussion of email technologies, we examine the DMARC technology for which an RFC was authored in March 2015, and discuss the creation of an environment for using it. In addition, we look at the email ecosystem, including domain reputation and feedback. In the “Web Traffic Report” section, we analyze the logs of all delivery servers for the live streaming delivery of video for the National High School Baseball Championship at Koshien Stadium held in August 2014, which resulted in a peak traffic of 108 Gbps, and a total of approximately 1.9 billion requests. We also examine differences in access trends due to access scale and device type that were revealed through the results of this analysis. Through activities such as these, IIJ continues to strive towards improving and developing our services on a daily basis while maintaining the stability of the Internet. We will keep providing a variety of solutions that our customers can take full advantage of as infrastructure for their corporate activities. Author: Toshiya Asaba President and CEO, IIJ Innovation Institute Inc. President and CEO, Stratosphere Inc. Mr. Asaba joined IIJ in its inaugural year of 1992, becoming involved in backbone construction, route control, and interconnectivity with domestic and foreign ISPs. He was named IIJ director in 1999, and executive vice president in charge of technical development in 2004. When the IIJ Innovation Institute Inc. was founded in June 2008, Mr. Asaba became its president and CEO. When Stratosphere Inc. was founded in April 2012, he also became president and CEO of that organization. 3 1. Infrastructure Security Increasingly Malicious PUAs In this report, we discuss increasingly malicious PUAs, and following on from our last report we cover actual usage cases for ID management technology, as well as initiatives for bolstering its security. We also look at the IOCs for malware that reprograms HDD firmware. Infrastructure Security 1.1 Introduction This report summarizes incidents to which IIJ responded, based on general information obtained by IIJ itself related to the stable operation of the Internet, information from observations of incidents, information acquired through our services, and information obtained from companies and organizations with which IIJ has cooperative relationships. This volume covers the period of time from January 1 through March 31, 2015. In this period a number of hacktivism-based attacks were once again carried out by Anonymous and other groups, and there was a rash of attacks including SNS account hijackings and website defacements. There were also a large number of information leaks due to unauthorized access. It has been pointed out that the personal information of up to 80 million people may have leaked in an incident that occurred at a health insurer in the United States. An issue was also discovered in software pre-installed on PCs. This could potentially allow encrypted Web browser communications to be intercepted by a third party, or fraudulent websites to be recognized as legitimate. These examples show that many security-related incidents continue to occur on the Internet. 1.2 Incident Summary Here, we discuss the IIJ handling and response to incidents that occurred between January 1 and March 31, 2015. Figure 1 shows the distribution of incidents handled during this period*1. Other 30.4% Vulnerabilities 28.6% n The Activities of Anonymous and Other Hacktivists Attacks by hacktivists such as Anonymous continued during this period. DDoS attacks and information leaks occurred at government-related and corporate sites in a large number of countries stemming from a variety of situations and History 1.3% causes. In January, a number of Massachusetts Institute of Technology (MIT) websites were defaced in memory of an activist who committed suicide the year before last. Similarly, in the Philippines a number of government Political and websites were defaced in protest against a firefight that took Social Situation 0.9% Security Incidents 38.8% place between Police and an armed group on Mindanao Island in January. In February, DDoS attacks were made on Figure 1: Incident Ratio by Category (January 1 to March 31, 2015) multiple Saudi Arabian banks in protest against the Saudi *1 Incidents discussed in this report are categorized as vulnerabilities, political and social situations, history, security incidents or other. Vulnerabilities: Responses to vulnerabilities associated with network equipment, server equipment or software commonly used over the Internet or in user environments. Political and Social Situations: Responses to incidents related to domestic and foreign circumstances and international events such